Computer spyware is newest weapon in Syrian conflict

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, IT Security, Privacy.

Discussion:  In Syria, regime supporters have released computer viruses that are designed to rob information from targeted users and send it to a government-owned server.  The information collected, such as user names, locations, and contact info, is then used by the regime to help fight protestors and activists in the country.  This information is collected… Read more »

Your face is being tracked

Posted by & filed under Civil Liberties, Electronic Surveillance, IT Standards, IT Trends, Social Networks.

Discussion:  Your face is being tracked in many different ways.  This article highlights six interesting and amazing ways that different technologies could be tracking your face.  Facial recognition software allows companies to tailor its advertising to different customers, as well as tracking the clientele that frequent different businesses.  This type of software even purports to be able… Read more »

Internet of things: Should you worry if your jeans go smart?

Posted by & filed under Civil Liberties, Cyber Security, E-Commerce, IT Security, IT Standards, IT Trends, RFID/Radio-Frequency Identification.

Discussion:  There are many physical objects, or “things”, that are now on the internet with the help of RFID tags (referred to as the “Internet of Things”).  Jeans, or another object that has an RFID tag, could potentially track a person’s every movement and broadcast its location 24 hours a day.  Is this invasion of… Read more »

Our Web freedom at the mercy of tech giants

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance.

Discussion:  Big media companies, and their political agendas, may have enough power to influence free speech on the web.  These companies are currently dealing with the issue of whether or not speech involving slander, hatred or violence needs to be controlled.  It is an issue of genuine economic and security concerns on the one hand with… Read more »

Cory Doctorow: DRM is no friend of business

Posted by & filed under App Economy, Civil Liberties, Competitive Advantage, Cyber Security, Intellectual Property.

Discussion:  Digital Rights Management (or DRM) is a term used for the access controls over digital content and devices.  Cory Doctorow, a highly respected personality in the technical world, believes that DRM is not successful as it is and is not beneficial to the business world.  He states that there is unfair copyright restrictions in… Read more »

Starting a revolution with technology

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Mobile Computing, Social Computing, Social Networks, Uncategorized, Wireless.

Discussion:  In early 2011 civil unrest in Egypt and the middle east let to political demonstrations that the Egyptian government believed threatening enough to the well being of the country that they shut down the World Wide Web in hopes of diminishing lines of communication between groups of protesters.  OpenMesh, an ad hoc wireless mesh network of individual… Read more »

Report: iPhones secretly track their users’ locations

Posted by & filed under Civil Liberties, Electronic Surveillance, IT Security, Mobile Computing, Open Source, Privacy, Video, Wireless.

Discussion: A team of researchers at iPhone Tracker recently discovered that iPhones and 3G-enabled iPads appear to be tracking and storing data about their users’ whereabouts without their knowledge.  Although most cell phone providers collect similar data as part of their operations, it is kept behind a firewall and normally requires a court order to… Read more »

Inside Google’s China misfortune

Posted by & filed under Business Analytics, Civil Liberties, Cyber Security, E-Business, E-Commerce, IT Security, IT Standards, IT Strategy, Privacy, Search Engine.

Discussion: On January 27, 2006, Google.cn went live in China, and within a few months, Google China’s headquarters was outfitted with the usual frills: foosball tables, a fully equipped gym, massage room, a huge cafeteria with free meals.  But signs of a distressed relationship soon followed: unexplained outages, Google’s operating license was suddenly no longer… Read more »